A Novel Group Key Establishment Scheme for Ad Hoc Networks

被引:0
|
作者
Liu Zhiyuan [1 ]
Wu Jian-she [1 ]
Ji Peng [1 ]
机构
[1] Huangshi Inst Technol, Coll Comp, Huangshi 435003, Hubei, Peoples R China
来源
MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS | 2009年
关键词
Key establishment; ad hoc network; secure channel; key exchange; MANAGEMENT;
D O I
10.1109/MINES.2009.144
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In mobile ad hoe networks, due to unreliable wireless media, nodes mobility and lack of infrastructure, providing a key establishment scheme is a challenge in this unique network environment. In this paper, a novel group key establishment scheme is proposed for secure communications in ad hoc networks. The nodes in network are divided into two parties: cell group consisting of group members and control group consisting of cell group controller. A centralized key establishment scheme is employed in cell group and a decentralized scheme is employed in control group. In proposed scheme, an implicitly certified public key approach is used, which reduces the certificate overhead and improves computational efficiency.
引用
收藏
页码:530 / 533
页数:4
相关论文
共 50 条
  • [21] Full Session Key Agreement Scheme Based on Chaotic Map in Vehicular Ad Hoc Networks
    Cui, Jie
    Wang, Yali
    Zhang, Jing
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (08) : 8914 - 8924
  • [22] Consistent group membership in ad hoc networks
    Roman, GC
    Huang, QF
    Hazemi, A
    PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, 2001, : 381 - 388
  • [23] TAKCS: Threshold authentication key configuration scheme for multilayer cluster in mobile ad hoc networks
    Lee, KH
    Hwang, CS
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U491 - U496
  • [24] A Polynomial Based Key Establishment Scheme for Heterogeneous Sensor Networks
    Lin, Iuon-Chang
    Huang, Shu-Yan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 41 - 44
  • [25] A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks
    Shi, Fei
    Baek, Jaejong
    Song, Jooseok
    Liu, Weijie
    TELECOMMUNICATION SYSTEMS, 2013, 52 (04) : 2397 - 2406
  • [26] A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks
    Fei Shi
    Jaejong Baek
    Jooseok Song
    Weijie Liu
    Telecommunication Systems, 2013, 52 : 2397 - 2406
  • [27] Secure Key Distribution for Mobile Ad Hoc Networks
    Dawoud, Dawoud S.
    Auxeeliya, Jesudoss
    IMETI 2010: 3RD INTERNATIONAL MULTI-CONFERENCE ON ENGINEERING AND TECHNOLOGICAL INNOVATION, VOL II (POST-CONFERENCE EDITION), 2010, : 326 - 331
  • [28] Key agreement protocol in ad-hoc networks
    Lang, WH
    Zhou, MT
    She, K
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 296 - 301
  • [29] GAKAP, multicast key agreement protocol for ad hoc networks based on group activity probability
    Boumso, A
    Bensaber, BA
    Biskri, I
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 700 - 704
  • [30] Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks
    Wu, Tsu-Yang
    Lee, Zhiyuan
    Yang, Lei
    Luo, Jia-Ning
    Tso, Raylin
    JOURNAL OF SUPERCOMPUTING, 2021, 77 (07) : 6992 - 7020